System and Method for Loading an Embedded Device to Authenticate and Secure Transactions
First Claim
1. A system for loading an embedded system, comprising;
- a network operations center operating a network load application;
the network load application operating the steps of;
generating a public/private key pair;
storing the private key; and
, transmitting the public key to a loader operating a loader load application;
the loader load application performing the steps of;
receiving the public key;
generating a plaintext token;
generating an encrypted token; and
, transmitting the plaintext token and the encrypted token to an embedded system.
6 Assignments
0 Petitions
Accused Products
Abstract
A system is provided for authenticating and securing product transactions. An integrated circuit is attached to a target, such as an optical disc or electronic device. The integrated circuit has an RF transceiver that is capable of establishing communication with an associated reading device. The integrated circuit also has a hidden memory, which can not be read externally, and a user memory. The hidden memory stores an authentication message, while the user memory stores readable authentication information. The hidden authentication message and the authentication information are related through a cryptographic process. However, even though the integrated circuit benefits from the cryptographic security, the integrated circuit only operates relatively simple logic operations. In this way, a highly secure transaction is enabled without requiring significant processing power or time at the integrated circuit. When the integrated circuit is placed near the reader, the reader reads the authentication information, and with the cooperation of a network operation center, uses the authentication information to derive an activation code. The reader passes the activation code to the integrated circuit, which compares the activation code to its hidden activation message. If they have a proper relationship, the communication has been authenticated, and the integrated circuit proceeds to perform an action.
-
Citations
29 Claims
-
1. A system for loading an embedded system, comprising;
-
a network operations center operating a network load application;
the network load application operating the steps of;
generating a public/private key pair;
storing the private key; and
,transmitting the public key to a loader operating a loader load application;
the loader load application performing the steps of;
receiving the public key;
generating a plaintext token;
generating an encrypted token; and
,transmitting the plaintext token and the encrypted token to an embedded system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system for loading an embedded system, comprising;
-
a network operations center operating a network load application;
the network load application operating the steps of;
generating a first public/private key pair;
storing the first public/private key pair in a database;
transmitting the first public key to a loader operating a loader load application;
the loader load application performing the steps of;
receiving the first public key;
generating a second public/private key pair;
generating an authentication code; and
,transmitting the authentication code and the second public key to an embedded system. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A system for loading an embedded system, comprising;
-
a network operations center operating a network load application;
the network load application operating the steps of;
generating a public/private key pair;
storing the private key; and
,transmitting the public key to a loader operating a loader load application;
the loader load application performing the steps of;
receiving the public key;
generating an authentication message;
transmitting the authentication message; and
,transmitting authentication information to an embedded system. - View Dependent Claims (29)
-
Specification